Showing 1 - 20 results of 132 for search 'Jian Feng', query time: 0.02s
Refine Results
-
1
-
2
Effective Protection of Water Resources--Top Priority Task of Building Green Guangdong by XUE Jian-feng, LIU Chen
Published 2005-01-01
Article -
3
Joint frequency-angle estimation using a pseudocovariance matrix by GU Jian-feng, WEI Ping
Published 2007-01-01
Article -
4
Multi-user broadcast authentication scheme in wireless sensor networks with defending against DoS attacks by GUO Jiang-hong, MA Jian-feng
Published 2011-01-01
Article -
5
EVALUATION OF STRENGTH IN PRE-DEFORMED AUSTENITIC STAINLESS STEEL USING NONLINEAR ULTRASONIC WAVE by ZHANG JianFeng, XUAN FuZhen
Published 2017-01-01
Article -
6
Provable secure trusted protocol for network storage by DUAN Xin-dong, MA Jian-feng
Published 2011-01-01
Article -
7
Manufacturer’s Business Strategy: Interaction of Sharing Economy and Product Rollover by Jian Feng, Bin Liu, Zhenfeng Liu
Published 2020-01-01
Article -
8
Effects of the Sharing Economy on Sequential Innovation Products by Zhenfeng Liu, Jian Feng, Jinfeng Wang
Published 2019-01-01
Article -
9
Secure and transparent data aggregation for wireless sensor networks by Jiang-hong GUO, Jian-feng MA
Published 2012-10-01
Article -
10
Block cipher mode research based on identifier of text files by Tong-ming ZHANG, Jian-feng GUAN
Published 2017-03-01
Article -
11
Optimum hierarchical segmentation of OCT images in retina based on macular distance by Jian-feng LI, Yi-zhou LU
Published 2017-04-01
Article -
12
Hybrid wireless mesh protocol by YANG Kai1, MA Jian-feng1
Published 2009-01-01
Article -
13
Location based reliability differentiation service for WSN by ZENG Yong1, MA Jian-feng1
Published 2008-01-01
Article -
14
New approach against Sybil attack in wireless sensor networks by FENG Tao1, MA Jian-feng2
Published 2008-01-01
Article -
15
Trusted routing based on D-S evidence theory in wireless mesh network by YANG Kai, MA Jian-feng, YANG Chao
Published 2011-01-01
Article -
16
Quality of service guarantee mechanism for enterprise video conference by Jian-feng DENG, Ling ZHANG, Jie ZHOU
Published 2013-09-01
Article -
17
Performance evaluation for JPEG compression on model-based source camera identification by Bo WANG, Jian-feng YIN, Ya-bin LI
Published 2016-09-01
Article -
18
UC secure one-time signature based broadcast authentication by ZHANG Jun-wei, MA Jian-feng, YANG Li
Published 2010-01-01
Article -
19
Provably secure private key protection scheme for smart mobile terminal by Jun MA, Jian-feng MA, Yuan-bo GUO
Published 2012-12-01
Article -
20
Research on Energy Harvesting Communication System by Jian Feng, Pingyang Wang, Lin Wang, Xing Zhang
Published 2015-02-01
Article